{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:35:30Z","timestamp":1730234130207,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T00:00:00Z","timestamp":1650585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,22]]},"DOI":"10.1109\/icccs55155.2022.9846012","type":"proceedings-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:40Z","timestamp":1660593760000},"page":"410-418","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing RUP security for the OCB mode"],"prefix":"10.1109","author":[{"given":"Yuchen","family":"Duan","sequence":"first","affiliation":[{"name":"East China Normal University,Software Engineering Institute,Shanghai,China"}]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[{"name":"East China Normal University,Software Engineering Institute,Shanghai,China"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_13"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21702-9_18"},{"year":"0","key":"ref10","article-title":"Lightweight cryptography"},{"article-title":"Challenges in authenticated encryption","year":"0","author":"bernstein","key":"ref11"},{"key":"ref12","first-page":"168","article-title":"Aesgcm-siv: Specification and analysis","volume":"2017","author":"gueron","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i2.143-161"},{"key":"ref16","first-page":"1059","article-title":"The intrup security of ocb with intermediate (parity) checksum","volume":"2016","author":"zhang","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_15"},{"key":"ref19","article-title":"Deterministic authenticated-encryption","volume":"6","author":"rogaway","year":"2007","journal-title":"Advances in Cryptology - EUROCRYPT 98"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03317-9_4"},{"article-title":"Ascon v1.2","year":"2014","author":"wu","key":"ref4"},{"year":"0","author":"andreeva","key":"ref27"},{"article-title":"Cryptographic competitions: Caesar","year":"0","author":"bernstein","key":"ref3"},{"article-title":"Aegis v1.1","year":"2014","author":"wu","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_2"},{"article-title":"Acorn v3","year":"2014","author":"wu","key":"ref5"},{"article-title":"Deoxys v1.41 v1","year":"2016","author":"jean","key":"ref8"},{"article-title":"Ocb v1.1","year":"2014","author":"krovetz","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_27"},{"article-title":"Colm v1","year":"2014","author":"andreeva","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_41"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27239-9_6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_3"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/11761679_25","article-title":"The security of triple encryption and a framework for code-based gameplaying proofs","author":"bellare","year":"2006","journal-title":"Advances in Cryptology - EUROCRYPT 2006"},{"year":"0","author":"shay","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_22"}],"event":{"name":"2022 7th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2022,4,22]]},"location":"Wuhan, China","end":{"date-parts":[[2022,4,25]]}},"container-title":["2022 7th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9845797\/9845820\/09846012.pdf?arnumber=9846012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:24:24Z","timestamp":1662409464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9846012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,22]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icccs55155.2022.9846012","relation":{},"subject":[],"published":{"date-parts":[[2022,4,22]]}}}